• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Xuejun, Cai Wenqi, Sun Zhixin, Wang Suoping. An Improved Minimalist Mutual-Authentication Protocol[J]. Journal of Computer Research and Development, 2012, 49(11): 2424-2431.
Citation: Zhang Xuejun, Cai Wenqi, Sun Zhixin, Wang Suoping. An Improved Minimalist Mutual-Authentication Protocol[J]. Journal of Computer Research and Development, 2012, 49(11): 2424-2431.

An Improved Minimalist Mutual-Authentication Protocol

More Information
  • Published Date: November 14, 2012
  • An improved minimalist mutual-authentication protocol (IM2AP) is proposed by protecting the messages transmitted between the reader and tag. It achieves mutual authentication by the pseudonym and key shared between the tag and reader, and then they start to transmit the private messages. In order to ensure that the mutual authentication of the tag and reader will not be attacked by malicious interference, the tag generates a random number by the Hamming weight of the key which can be shared with the reader and then uses the random number to protect the transmitted message on the cyclic shift. Thus the attacker cant tamper with a particular bit and the protocol effectively avoids de-synchronization and the full disclosure attack. Analysis of security and performance shows that when the security of the lightweight security authentication protocols is generally weak, this protocol can improve the security and reliability of the system with limited cost, so it has a high practical value.
  • Related Articles

    [1]Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    [2]Ma Chao, Dai Zibin, Li Wei, Nan Longmei, Jin Yu. RPRU: A Unified Architecture for Rotation and Bit-Extraction Operations in General-Propose Processor[J]. Journal of Computer Research and Development, 2018, 55(2): 426-437. DOI: 10.7544/issn1000-1239.2018.20160775
    [3]Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin. RFID Lightweight Authentication Protocol Based on PRF[J]. Journal of Computer Research and Development, 2014, 51(7): 1506-1514.
    [4]Zhang Fengjun, Zhao Ling, An Guocheng, Wang Hongan, Dai Guozhong. Mean Shift Tracking Algorithm with Scale Adaptation[J]. Journal of Computer Research and Development, 2014, 51(1): 215-224.
    [5]Tang Jie, Wen Zhonghua, Wang Quan, Huang Wei. Solving Strong Cyclic Planning in Nondeterministic Reversible Planning Domain[J]. Journal of Computer Research and Development, 2013, 50(9): 1970-1980.
    [6]Wang Shaohui, Liu Sujuan, Chen Danwei. Scalable RFID Mutual Authentication Protocol with Backward Privacy[J]. Journal of Computer Research and Development, 2013, 50(6): 1276-1284.
    [7]Liu Jie, Liang Huaguo, Jiang Cuiyun. Test Compression Approach of Adopting Cyclic Shift and Optimal Coding[J]. Journal of Computer Research and Development, 2012, 49(4): 873-879.
    [8]Yuan Guanglin, Xue Mogen, Han Yusheng, Zhou Pucheng. Mean Shift Object Tracking Based on Adaptive Multi-Features Fusion[J]. Journal of Computer Research and Development, 2010, 47(9): 1663-1671.
    [9]Tang Yang, Pan Zhigeng, Tang Min, Pheng Ann Heng, Xia Deshen. Image Segmentation with Hierarchical Mean Shift[J]. Journal of Computer Research and Development, 2009, 46(9): 1424-1431.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (748) PDF downloads (489) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return